0
I Use This!
Activity Not Available
Analyzed about 2 months ago. based on code collected about 2 months ago.

This project has been reported as a duplicate of Synchronizing Key Server. This project will be deleted upon review by an Open Hub administrator.

 

Project Summary

OverviewSKS is an OpenPGP keyserver whose goal is to provide easy to deploy, decentralized, and highly reliable synchronization. That means that a key submitted to one SKS server will quickly be distributed to all key servers, and even wildly out-of-date servers, or servers that experience spotty connectivity, can fully synchronize with rest of the system. You can see SKS in action here:

http://minsky.surfnet.nl http://keyserver.fabbionne.net And there are many more. Go here to see the members of a pool of sks keyservers.

The foundation of SKS is an efficient algorithm for reconciling remote data sets. That algorithm is described in the following papers:

Set Reconciliation with Nearly Optimal Communication Complexity Practical Set Reconciliation You can find the (somewhat limited) documentation here.

FeaturesHighly efficient and reliable reconciliation algorithm Follows RFC2440 and RFC2440bis carefully --- unlike PKS, SKS supports new and old style packets, photoID packets, multiple subkeys, and pretty much everything allowed by the RFCs. Fully compatible with PKS system --- can both send and receive syncs from PKS servers, ensuring seamless connectivity. Simple configuration: each host just needs a (partial) list of the other participating key servers. Gossip is used to distribute information without putting a heavy load an any one host. Supports HKP/web-based querying, and machine readable indices The design of SKS is deliberately simple. The server consists of two single-threaded processes. The first, sks db, fulfills the normal jobs associated with a public key server, such as answering web requests. The only special functionality of sks db is that it keeps a log summarizing the changes to the key database. sks recon does all the work with respect to reconciling hosts databases. sks recon keeps track of specialized summary information about the database, and can use that information to efficiently determine the differences between its database and that of another host.

Tags

keyserver ocaml pgp

In a Nutshell, sks-keyserver...

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Include Copyright

Include License

Distribute Original

Disclose Source

State Changes

These details are provided for information only. No information here is legal advice and should not be used as such.

All Licenses

Project Security

Vulnerabilities per Version ( last 10 releases )

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    Black Duck offers a free trial so you can discover if there are open source vulnerabilities in your code
  • ...
    compare projects before you chose one to use
  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    learn about Open Hub updates and features on the Open Hub blog
About Project Security

Languages

Languages?height=75&width=75
OCaml
88%
C
7%
6 Other
5%

30 Day Summary

Sep 19 2018 — Oct 19 2018

12 Month Summary

Oct 19 2017 — Oct 19 2018
  • 0 Commits
    Down -14 (100%) from previous 12 months
  • 0 Contributors
    Down -2 (100%) from previous 12 months